Palo Alto Networks

Channel profile:

Webcasts and Videos

Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com or call us at 1-877-524-1031.

Threats are evolving far too quickly for point products to keep up. Security point products that operate and analyze in silos have led to security gaps and fragmented policies that fail to prevent successful cyberattacks. With more than 9 million new instances of malware each month, deploying disparate point products is no longer enough.

Members of the Society for Worldwide Interbank Financial Telecommunications (SWIFT) cooperative had to self-attest to new mandatory security controls at the end of 2017. The next self-attestation will be required by year end 2018. After that point, SWIFT reserves the right to report non-compliance to counterparties and appropriate local regulators.

How did your institution fare in its initial self-attestation to SWIFT’s security controls? If there was room for improvement,

• Join this webinar to learn how to meet and/or exceed SWIFT mandatory and advisory security controls with Palo Alto Networks products
• Hear about additional best practices that can further improve your cybersecurity posture.

In the big picture, the SWIFT security controls and further best practices from Palo Alto Networks contribute to overall cyber hygiene, and should prove to be beneficial to all financial institutions - regardless of whether they are SWIFT members or not.

Our customers tell us that in addition to minimizing their risk, our Security Operating Platform – made up of integrated network, cloud and endpoint security technologies – actually decreases their incident response time while increasing the reach and efficiency of their security teams.

Intrigued, we commissioned Forrester® Consulting to examine the overall benefits, including ROI, that enterprise customers would likely realize after deploying the Security Operating Platform.

The study, generated after extensive interviews with longstanding Palo Alto Networks® customers, focuses on the quantifiable savings of both time and money that a hypothetical organization would realize. The study found that, over a three-year period, this organization would:

Join Palo Alto Networks and guest speaker Henry Huang, principal consultant from Forrester, as we discuss the study’s findings. We encourage you to use this research to help guide your cybersecurity investment strategy and make the right security choices.

***The Total Economic Impact™ Of Palo Alto Networks, a March 2018 commissioned study conducted by Forrester Consulting on behalf of Palo Alto Networks

Zero Trust is a familiar concept when speaking about network architecture. The terms "never trust, always verify" rings a familiar tune to those focused on securing the network. However, as security technologies have advanced to cross-communicate between network and endpoints, Zero Trust principles should also extend from the network to the endpoints.

Join John Kindervag, the creator of the Zero Trust model, former Forrester analyst and current Field CTO at Palo Alto Networks, as he:

- Discusses why endpoints need to talk to and integrate with other security technologies
- Maps Zero Trust to the five critical points of the security architecture
- Provides a framework as to why and how to extend Zero Trust to the endpoint

We'll also be hearing from, Lieuwe Jan Koning, CTO and Co-Founder of ON2IT, for an actual use case on endpoint Zero Trust adoption. Lieuwe will discuss:

Microsoft® Azure® can change the way your organization does business by increasing agility, scalability and storage. Although the benefits of Azure – and the public cloud – are well-documented, questions about security, potential data loss and business interruption remain, potentially slowing cloud adoption.

Join us for a webinar focused on accelerating your move to Azure and securing your data, apps and DevOps environments once there by delivering consistent, automated security across all your environments.

Microsoft® Azure® can change the way your organization does business by increasing agility, scalability and storage. Although the benefits of Azure – and the public cloud – are well-documented, questions about security, potential data loss and business interruption remain, potentially slowing cloud adoption.

Join us for a webinar focused on accelerating your move to Azure and securing your data, apps and DevOps environments once there by delivering consistent, automated security across all your environments.

Threats are evolving far too quickly for point products to keep up. Security point products that operate and analyze in silos have led to security gaps and fragmented policies that fail to prevent successful cyberattacks. With more than 9 million new instances of malware each month, deploying disparate point products is no longer enough.

Today, organizations need higher performance and faster access to the latest innovative technologies in order to grab whatever competitive edge they can. This almost always means going to the cloud.

Unfortunately, in the rush to get there, enterprises can find themselves with data and applications scattered across private and public clouds – often multiple public clouds – spanning IaaS, PaaS and SaaS.

Without the appropriate security and compliance strategy in place, this often results in poor visibility and increased risk. The simple truth is that multi-cloud security isn’t intuitive.

Today, organizations need higher performance and faster access to the latest innovative technologies in order to grab whatever competitive edge they can. This almost always means going to the cloud.

Unfortunately, in the rush to get there, enterprises can find themselves with data and applications scattered across private and public clouds – often multiple public clouds – spanning IaaS, PaaS and SaaS.

Without the appropriate security and compliance strategy in place, this often results in poor visibility and increased risk. The simple truth is that multi-cloud security isn’t intuitive.

This session will dive deep into the skills and techniques mastered during Cyber Ranges such as preventing live attacks, responding to real-world threats, and building end-to-end prevention processes while battling other teams during full-on cyberattack scenarios.

This is the “Best of Ignite” Week. Day 4 will be a deep dive on Threat Intelligence.

Drive Action on Threat Intelligence with AutoFocus and MineMeld
Learn how to bridge the gap between machine-generated threat data and security operations professionals with AutoFocus contextual threat intelligence and MineMeld syndication engine. Enriched with context from WildFire service, the Unit 42 threat research team and third-party feeds, AutoFocus enables you to identify and act against the most critical threats facing your organization. This industry-first threat operations approach allows native workflows between intelligence generation, verification and prevention enforcement through the Next-Generation Security Platform. You’ll learn:

• How to use integrated threat intelligence to improve existing security workflows
• The value of adding real-time context to security events
• How to enable aggregation of any third-party threat intelligence feed with MineMeld
• How to drive automated prevention enforcement for highly targeted attacks